A collection of cybersecurity content.

Category: Hardening

  • Idea List for Lost or Stolen Corporate Computers

    Idea List for Lost or Stolen Corporate Computers

    Before implementing any monitoring or recording methods, consult with legal experts, as these practices may be illegal or unethical in some jurisdictions, potentially violating privacy laws and individuals’ rights. Intro Although the primary emphasis here addresses a lost or stolen corporate computer with some type of backdoor into the machine (EDR or otherwise), some of […]

  • Unconstrained Delegation: Hunting for AD Weaknesses

    Unconstrained Delegation: Hunting for AD Weaknesses

    Intro Unconstrained delegation is a setting in Active Directory that allows a computer to impersonate a user and perform actions on their behalf. This feature is enabled by default on domain controllers in Active Directory. Concept Explained Imagine you have a big library with lots of books. Some of the books are really special and […]

  • Fork Bombs: Hardening Unix-Systems from Denial of Service (DoS) Attacks

    Fork Bombs: Hardening Unix-Systems from Denial of Service (DoS) Attacks

    Intro A Denial-of-Service (DoS) attack is a malicious attempt to disrupt the availability of a computer, network, or website by overwhelming it with excessive traffic or resource utilization, rendering it unable to fulfill legitimate requests. Denial-of-Service (DoS) attacks come in various forms and exploit different weaknesses in a network or system to disrupt its availability. […]